Temporary Identity.
Permanent Privacy.
Create throwaway anonymous identities that auto-expire. Communicate freely, then vanish without a trace. Premium unlocks custom durations, codes, and extended lifetimes.
Free vs Premium
Everyone gets Disposable Hats. Premium users unlock custom codes, extended durations up to 365 days, and advanced burn policies.
Built to Disappear
Disposable Hats are engineered for impermanence. Every identity is isolated, encrypted, and destined for destruction.
Auto-Expiring Identity
Every Disposable Hat has a countdown. When time runs out, the hat, its encryption keys, and all associated data are permanently destroyed.
TEMPORARYCryptographic Isolation
Each Disposable Hat gets its own encryption key pair. No link to your permanent identity exists on the server or in the protocol.
ENCRYPTEDZero-Trace Burn
When a Disposable Hat expires, all message history, keys, pairing data, and metadata are permanently erased. No forensic recovery possible.
BURNPremium Flexibility
Unlock custom hat codes, durations from 24 hours to 365 days, advanced burn policies, and the ability to create multiple Disposable Hats simultaneously.
PREMIUMHow Disposable Hats Work
Four steps from creation to destruction. Your permanent identity is never exposed.
Create Disposable
Tap "Create Disposable" from the main menu. Choose duration (or customize with Premium). A new anonymous identity is generated instantly.
Share the Code
Share your temporary Hat code with anyone. They pair with you using this disposable identity — your real Hat stays hidden.
Communicate Freely
Send messages, files, and media through your Disposable Hat. All communications are end-to-end encrypted under the disposable key pair.
Auto-Destroy
When the timer expires, the hat burns. Messages, keys, pairings — everything is permanently destroyed. No trace remains.
Free vs Premium
Every user can create Disposable Hats. Premium unlocks the full power of temporary identities.
Free
Available to all users
- ✓ 24-hour Disposable Hats
- ✓ Random hat code assigned
- ✓ End-to-end encrypted messages
- ✓ Auto-burn on expiration
- ✓ One active Disposable Hat at a time
👑 Premium
Full control over disposable identities
- ★ Custom duration: 24h to 365 days
- ★ Choose your own hat code
- ★ Multiple active Disposable Hats
- ★ Advanced burn policies (manual, auto-read, timed)
- ★ Priority pairing and delivery
- ★ All free features included
When to Use a Disposable Hat
Anytime you need a temporary identity that leaves no trace. Here are some common scenarios.
Meeting Strangers
Share a temporary identity with new contacts. If things don't work out, the hat expires and they can never reach you again.
Online Marketplaces
Communicate with buyers or sellers without exposing your permanent identity. Once the transaction is done, burn the hat.
Source Protection
Journalists and sources can establish temporary channels that auto-destroy, leaving no forensic trail.
Travel & Events
Create short-lived identities for travel companions, conference contacts, or event organizers. No long-term commitments.
Sensitive Consultations
Legal, medical, or financial professionals can create temporary channels for sensitive client communications.
Security Research
Researchers can communicate findings through disposable channels that self-destruct after the engagement ends.
What We Enforce
Disposable Hats are built on strict isolation and destruction principles.
✓ Enforced by Architecture
- ✓ Unique encryption key pair per Disposable Hat
- ✓ Cryptographic isolation from permanent identity
- ✓ Automatic destruction on timer expiration
- ✓ All message history erased on burn
- ✓ No server-side link between disposable and permanent Hats
- ✓ End-to-end encryption for all communications
- ✓ Zero-knowledge server architecture
✗ Never Allowed
- ✗ No recovery of burned Disposable Hats
- ✗ No extension after expiration
- ✗ No linking disposable to permanent identity
- ✗ No server-side message storage after burn
- ✗ No third-party access to encryption keys
- ✗ No metadata retention after destruction